Image scrambling adversarial autoencoder based on the asymmetric encryption

被引:20
作者
Bao, Zhenjie [1 ]
Xue, Ru [1 ]
Jin, Yadong [1 ]
机构
[1] Xizang Minzu Univ, Sch Informat Engn, Xianyang, Shaanxi, Peoples R China
关键词
Transmission security; Image scrambling; Adversarial autoencoder; Asymmetric encryption; SEMI-TENSOR PRODUCT; ALGORITHM; MATRIX; PERMUTATION;
D O I
10.1007/s11042-021-11043-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For the purpose of information transmission security, image scrambling is to encrypt the image by changing the image pixel values and pixel positions. Based on the asymmetric encryption, we propose a model of Image Scrambling Adversarial Autoencoder. Firstly, we describe an encoder-decoder framework to imitate the procedure of image scramble, descramble and the key generation. Secondly, we employ the generator network of CycleGAN as the encoder and decoder structure of our method to transfer the secret image to totally meaningless image and reconstruct it. Thirdly, the parameters of the encoder and decoder can be regarded as the public key and private key. Then, the patchGANs discriminator is used to distinguish encoded images and evenly distributed noise by image blocks. Moreover, we combine the encode-then-decode loss function with the adversarial loss function by an adjustable parameter in order to make the model training results more stable. Experiments show that our method can accomplish automatic image scrambling in ten different scenes which include Africa people and villages, beach, buildings, buses, dinosaurs, elephants, flowers, horses, mountains and glaciers, food. Compared with 3D Arnold transformation and CycleGAN, scrambled pixels by our method are more evenly distributed intuitively. What is more, extensive experiments show that the proposed method can address security requirements partly and achieve a good encryption efficiency. In addition, contrast experimental results show that the combination of the encode-then-decode loss function and the adversarial loss function is essential to achieve the ideal results of image scrambling and restoration.
引用
收藏
页码:28265 / 28301
页数:37
相关论文
共 69 条
[31]   Color image encryption by using the rotation of color vector in Hartley transform domains [J].
Liu, Zhengjun ;
Dai, Jingmin ;
Sun, Xiaogang ;
Liu, Shutian .
OPTICS AND LASERS IN ENGINEERING, 2010, 48 (7-8) :800-805
[32]  
Luo H, 2004, J IMAGE GRAPHICS, V10, P79, DOI 10.013
[33]  
Makhzani Alireza, 2015, arXiv
[34]   Least Squares Generative Adversarial Networks [J].
Mao, Xudong ;
Li, Qing ;
Xie, Haoran ;
Lau, Raymond Y. K. ;
Wang, Zhen ;
Smolley, Stephen Paul .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, :2813-2821
[35]  
Miller VS, 1985, C THEOR APPL CRYPT T, DOI [DOI 10.1007/3-540-39799-X_31, DOI 10.1007/3-540-39799-X31]
[36]   A new secure and sensitive image encryption scheme based on new substitution with chaotic function [J].
Parvin, Zahra ;
Seyedarabi, Hadi ;
Shamsi, Mousa .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (17) :10631-10648
[37]  
Pellegrini A, 2010, DES AUT TEST EUROPE, P855
[38]   A new class of scrambling transformation and its application in the image information covering [J].
Qi, DX ;
Zou, JC ;
Han, XY .
SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 2000, 43 (03) :304-312
[39]   Research on Face Image Encryption Based on Deep Learning [J].
Qin, Yanyan ;
Zhang, Chennan ;
Liang, Rui ;
Chen, Mingrui .
2018 4TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND MATERIAL APPLICATION, 2019, 252
[40]  
Tanaka M., 2018, Em: 2018 IEEE International Conference on RFID Technology Application (RFID-TA), P1, DOI DOI 10.1109/ICCE-CHINA.2018.8448772